Archive

Category Archives for "Networking"

One Weird Trick to really be Smarter

For some reason, I seem to be a bit of a question magnet. Not that I mind, of course, because… Well, you’ll discover why in just a moment. I was reminded of this, this week, when someone asked me—”how do you know so much about so many different things?” Before I answered them, Steve Hood published his first post on his journey to the CCNA. Buried in this post is something very important in relation to the question in hand—

Further, over the last six months I have worked, for the first time, in environments in which I am not the sole networking professional. Simply being able to say “hey, what do you think of doing ____?” has been awesome. Before joining a networking team I could only see my own perspective and the things I thought to google. Now I have the advantage of a reply from someone with more or different experience.

This completely exposes one of my primary pathways to knowing a lot of stuff about a lot of stuff. If you don’t see it yet, here it is in plain language, one weird trick that will really make you smarter.

Make certain you are Continue reading

Nokia returns to smartphones at long last, but you can’t buy it (and probably don’t want to)

In December, Finland-based HMD Global announced to some fanfare that its first Nokia-branded Android handsets would be landing in early 2017. Less than 10 days into the new year, the first model has already arrived, but those in the U.S. looking to get their hands on the first Nokia phone in years will have to wait a little longer.If the Nokia 6, as HMD is calling it, is any indication of what’s to come from its licensing deal, there isn’t too much to get excited about. Squarely aimed at the budget market, the phone features a 5.5-inch LCD screen, 4GB of RAM, a 16MP camera, 64GB of storage, and a 3,000 mAh battery. Under the screen is a Snapdragon 430 processor, and while the phone does run Nougat, it remains to be seen what kind of skin HMD has applied to it. It will sell for around $250 in an exclusive deal with China’s Jingdong Mall online shop. The My Nokia Blog also also uncovered a commercial for the phone.To read this article in full or to leave a comment, please click here

Russia: US fueling ‘witch hunt’ with election hacking claims

Russia dismissed an intel report claiming that the Kremlin meddled with the U.S. presidential election, saying the accusations were "amateurishly emotional" and driving a "witch-hunt.""There was nothing in this report that deserved to be read in detail," said Kremlin spokesman Dmitry Peskov on Monday, according to the Russian news agency TASS.The U.S. intel report, published on Friday, accused Russian President Vladimir Putin of personally ordering a secret campaign meant to influence last year's presidential election.To read this article in full or to leave a comment, please click here

Russia: US fueling ‘witch hunt’ with election hacking claims

Russia dismissed an intel report claiming that the Kremlin meddled with the U.S. presidential election, saying the accusations were "amateurishly emotional" and driving a "witch-hunt.""There was nothing in this report that deserved to be read in detail," said Kremlin spokesman Dmitry Peskov on Monday, according to the Russian news agency TASS.The U.S. intel report, published on Friday, accused Russian President Vladimir Putin of personally ordering a secret campaign meant to influence last year's presidential election.To read this article in full or to leave a comment, please click here

Turks point to U.S. as source of cyberattacks, but don’t level blame

Figuring out who’s behind cyberattacks is always difficult, and responsible security analysts are reluctant to point fingers without a smoking gun, which seems to be the case with recent disruptions of the power system in Turkey.News sources here and here say the Turkish Energy Ministry blames storms and sabotage of underground power lines for outages around the country. It also says coordinated cyberattacks originating in the United States have been thwarted but also been keeping security teams busy. It doesn’t like the outages directly to the cyberattacks, the sources say.To read this article in full or to leave a comment, please click here

Turks point to U.S. as source of cyberattacks, but don’t level blame

Figuring out who’s behind cyberattacks is always difficult, and responsible security analysts are reluctant to point fingers without a smoking gun, which seems to be the case with recent disruptions of the power system in Turkey.News sources here and here say the Turkish Energy Ministry blames storms and sabotage of underground power lines for outages around the country. It also says coordinated cyberattacks originating in the United States have been thwarted but also been keeping security teams busy. It doesn’t like the outages directly to the cyberattacks, the sources say.To read this article in full or to leave a comment, please click here

I discussed some IP Mobility solutions including LISP

Couple days ago I discussed some IP Mobility solutions, including LISP (Locator Identity Separation Protocol) with the CCDE students. Basically all IP Mobility solutions work in a similar way. New location of the host Address needs to be learned either via routing system or authoritative server. Host information is called identity and it can be MAC […]

The post I discussed some IP Mobility solutions including LISP appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Container Namespaces – Deep dive into container networking



Of late, there have been various Open source projects to manage networking for containers. Docker implemented "libnetwork". I've written in the past about using Calico with Docker containers. Debugging and low level tweaks to performance isn't easy without an in-depth understanding of how the network stack works for a container. This post tries to explain network namespaces and its role in container networking using default networking that comes out-of-box with docker.

As you probably already know containers use namespaces to isolate resources and rate limit their use. Linux's network namespaces are used to glue container processes and the host networking stack. Docker spawns a container in the containers own network namespace (use the CLONE_NEWNET flag defined in sched.h when calling the clone system call to create a new network namespace for the subprocess) and later on runs a veth pair (a cable with two ends) between the container namespace and the host network stack. If you are new to network namespaces this blog post by Scott gives a quick overview and serves as a good 101 refresher if you are already familiar with these concepts but haven't used them for a while.

Now lets see how to Continue reading

This tool can help weed out hard-coded keys from software projects

A security researcher has developed a tool that can automatically detect sensitive access keys that have been hard-coded inside software projects.The Truffle Hog tool was created by U.S.-based researcher Dylan Ayrey and is written in Python. It searches for hard-coded access keys by scanning deep inside git code repositories for strings that are 20 or more characters and which have a high entropy. A high Shannon entropy, named after American mathematician Claude E. Shannon, would suggest a level of randomness that makes it a candidate for a cryptographic secret, like an access token.Hard-coding access tokens for various services in software projects is considered a security risk because those tokens can be extracted without much effort by hackers. Unfortunately this practice is very common.To read this article in full or to leave a comment, please click here

This tool can help weed out hard-coded keys from software projects

A security researcher has developed a tool that can automatically detect sensitive access keys that have been hard-coded inside software projects.The Truffle Hog tool was created by U.S.-based researcher Dylan Ayrey and is written in Python. It searches for hard-coded access keys by scanning deep inside git code repositories for strings that are 20 or more characters and which have a high entropy. A high Shannon entropy, named after American mathematician Claude E. Shannon, would suggest a level of randomness that makes it a candidate for a cryptographic secret, like an access token.Hard-coding access tokens for various services in software projects is considered a security risk because those tokens can be extracted without much effort by hackers. Unfortunately this practice is very common.To read this article in full or to leave a comment, please click here

Atlassian acquires team-management software vendor Trello

Atlassian, the company behind HipChat and the JIRA software development tool, plans to acquire Trello, a vendor of the eponymous collaborative project management software.The deal will give Atlassian users new ways to organize, discuss and complete their work, Mike Cannon-Brookes, Atlassian's co-founder and co-CEO, wrote in a blog post Monday.  "By adding Trello to the Atlassian family, we're giving teams more choice in the tools they use to support the way that they want to work," he said. Trello will offer "a fun new way for teams to organize the often messy range of information that feeds into great teamwork."To read this article in full or to leave a comment, please click here

Huge spike in ransomed MongoDB installs, doubled to over 27,000 in a day

In the span of a day, the number of MongoDB installations that were erased and replaced with ransom notes has more than doubled, spiking to 27,000 as more cyber thugs jump on the ransom bandwagon. Niall Merrigan It started last week when security researcher Victor Gevers discovered that about 200 MongoDB databases had been erased and held for ransom. By Tuesday, 2,000 databases were effected; the number climbed to 10,500 by Friday and kept climbing. Then the ransomed databases jumped from 12,000 to 27,000, according to security researcher Niall Merrigan.To read this article in full or to leave a comment, please click here

Huge spike in ransomed MongoDB installs, doubled to over 27,000 in a day

In the span of a day, the number of MongoDB installations that were erased and replaced with ransom notes has more than doubled, spiking to 27,000 as more cyber thugs jump on the ransom bandwagon. Niall Merrigan It started last week when security researcher Victor Gevers discovered that about 200 MongoDB databases had been erased and held for ransom. By Tuesday, 2,000 databases were effected; the number climbed to 10,500 by Friday and kept climbing. Then the ransomed databases jumped from 12,000 to 27,000, according to security researcher Niall Merrigan.To read this article in full or to leave a comment, please click here

28% off DryGuy Travel Dry DX Boot and Shoe Dryer – Deal Alert

The DryGuy Travel Dry DX Portable Boot Dryer and Shoe Dryer combines traditional convection drying with forced air to create a hybrid system that dries boots and shoes in less time than it takes most other portable dryers, to help prevent bacteria, fungus, and mildew that causes odors and eventually leads to deterioration. An integrated fan at the front of the DX helps draw fresh air over the thermal heating elements, venting warm air throughout the toe box and removing any moisture. The DryGuy Travel DX features an AC/DC power adaptor which means it works in the home or from the car. It will not damage fragile materials. The DryGuy Travel Dry DX Portable Boot Dryer and Shoe Dryer weighs just 1.25 pounds and fits easily into carry-on luggage. Its typical list price of $32 has been reduced to just $23. See it on Amazon.To read this article in full or to leave a comment, please click here